How connected cars can be moving targets for hackers

  • New car models are packed with computer chips, sensors and mobile technology that hackers could exploit to sabotage systems or commandeer controls.
File photo
File photo

As cars evolve into rolling mobile computers, the potential for disastrous cyber attacks has become a new road hazard.

Israeli cybersecurity firm GuardKnox demonstrated the threat in a Formula 1 driving simulation at the Consumer Electronics show this week in Las Vegas.

Moments into the virtual drive, a GuardKnox engineer playing the role of hacker struck and the steering wheel no longer controlled the speeding car.

Also check these Cars

Find more Cars
Hyundai Kona Electric 2024 (HT Auto photo)
UPCOMING
BatteryCapacity Icon64.8 kWh Range Icon418 Km
₹ 25 Lakhs
Alert Me When Launched
Hyundai Kona Electric (HT Auto photo)
BatteryCapacity Icon39.2 kWh Range Icon452 km
₹ 23.79 Lakhs
Compare
View Offers
Mahindra Xev 9e (HT Auto photo)
BatteryCapacity Icon59 kWh Range Icon542 km
₹ 21.90 Lakhs
Compare
Tata Avinya (HT Auto photo)
UPCOMING
Range Icon500 km
₹ 30 - 60 Lakhs
Alert Me When Launched
Byd Atto 3 (HT Auto photo)
BatteryCapacity Icon60.48 kWh Range Icon521 km
₹ 24.99 Lakhs
Compare
View Offers
Tata Curvv Ev (HT Auto photo)
BatteryCapacity Icon55 kWh Range Icon585 km
₹ 17.49 Lakhs
Compare
View Offers

The faux race was over for the driver, stuck on the side of the road in a scenario that cybersecurity specialists say could become very real.

New car models are packed with computer chips, sensors and mobile technology that hackers could exploit to sabotage systems or commandeer controls.

Opportunities for attacks are being revved up by the trend of self-driving, electric cars communicating in real-time with the cloud, smart city infrastructures, and one another.

GuardKnox chief executive Moshe Shlisel gave an example of a hacker remotely taking control of a fuel tanker truck, sending it to crash into a building.

"It's September 11 on wheels," Shlisel said in an interview at CES.

Cybersecurity has become as integral to vehicle engineering as crash safety and fuel efficiency, according to Henry Bzeih, a former member of the Council for Automobile Cybersecurity, who spoke at the Las Vegas event.

"Connectivity is the reason why this is happening," Bzeih said.

"Now, all elements have to be designed with cybersecurity in mind."

'Anything is possible'

Israeli startup Upstream logged more than 150 cybersecurity incidents involving automobiles last year, twice as many as in 2018.

The majority of those hacks involve remotely car door locks, but an increasing number targeted software applications or connections to the cloud.

Last year in Chicago, dozens of luxury cars were stolen by hacking Daimler's Car2Go app.

"The ultimate worst-case scenario would be if somebody applies one of the car functions when it's not supposed to do that, and does that across multiple vehicles," said Upstream vice president Dan Sahar.

"For example, someone hits the brakes on all vehicles of a specific model at the same time. That would be catastrophic."

Since cars in model lines share engineering specifications, they share system vulnerabilities by design.

"If you can design an attack and execute it on a computer, and that computer is attached to a car, anything is possible," said Ralph Echemendia, expert in cybersecurity and self-described "ethical hacker."

Five years ago, a pair of cybersecurity researches remotely commandeered the controls of a Jeep Cherokee by taking advantage of a vulnerability in its infotainment system, triggering a recall of vehicles.

Never-ending battle

Carmakers have responded to the menace by offering bounties for vulnerabilities found by researchers and paying partners to build security into components.

Upstream collects data shared to the cloud by vehicles, scouring it in real time for strange activity that could signal hackers are up to no good.

GuardKnox engineers drew on their experience in the Israeli air force to design a processor that protects computers in vehicles and also serves as a secure operating system.

As in the world of smartphones and desktop computing, hackers relentlessly seek ways to infiltrate new software or features in automobiles in an ever-escalating battle with defenders.

First Published Date: 10 Jan 2020, 10:58 AM IST
NEXT ARTICLE BEGINS

Check Latest Offers

Please provide your details to get Personalized Offers

Choose city
+91 | Choose city
Choose city
Select a dealer

Want to get the best price for your existing car?

Powered by: Spinny Logo
By clicking "View Offers" you Agree to our Terms and Privacy Policy
Dear Name

Please verify your mobile number.

+91 | Choose city
Couldn't verify the OTP.
It's either expired or it's incorrect.